Mobile Security

Mobile security news, trends, analysis and practical advice

people security
marijuana

smartphone security

AT&T call centers sold mobile customer information to criminals

Employees at three overseas call centers sold hundreds of thousands of AT&T customer records, including names and Social Security numbers, to criminals who attempted to use the customer information to unlock stolen mobile phones,...

android malware

Fewer than 1% of Android devices affected by potentially harmful apps

Based on data collected by Google, less than 1% of Android devices had a potentially harmful application installed last year.

Salesforce buys mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.

mobile security

9 security gadgets for mobile devices

If you use your smartphone or tablet for work, you need to keep your data secure when you're on the go. We look at nine gadgets that try to keep your important data out of the hands of others.

android malware

Android flaw puts personal data at risk for millions

Nearly half of Android devices are vulnerable to an attack that could replace a legitimate app with malicious software that can collect sensitive data from a phone.

Android's smart lock detects when you carry your phone

Google is adding a feature to Android's smart lock that could significantly cut down on the number of times users need to enter a passcode to unlock their phones while they are out and about.

mobile malware

Hundreds of Android and iOS apps are still vulnerable to FREAK

Hundreds of Android and iOS apps are still vulnerable to a dangerous attack revealed two weeks ago that can compromise encrypted data.

password stock image

Yahoo's new on-demand password system is no replacement for two-factor authentication

In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones.

Alibaba uses facial recognition tech for online payments

E-commerce giant Alibaba Group and affiliated online payment service Alipay are aiming to use facial recognition technology to take the place of passwords.

Snowden docs show CIA tried to defeat Apple device security

Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.

Four incredible smartphone camera technologies

Mobile World Congress this week ushered in a range of trends, but one underappreciated development is the use of smartphone camera technology to do more than take selfies and cat photos.

galaxy s6 edge

Galaxy S6 and Edge feature plums for workers and IT shops

With the Galaxy S6 and Galaxy S6 Edge, Samsung is making a concerted effort to attract workers as potential buyers and to win the hearts of IT managers who have to wrangle with enterprise smartphone security and management.

enterprise security

How to connect to enterprise Wi-Fi security on Android devices

Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know.

android 50 lollipop

The data on your new Lollipop device may not be encrypted

Some smartphone makers are not configuring Android devices running Lollipop to automatically encrypt personal data, which Google had said would scramble data by default.

Biometric authentication

Mobile World Congress: Bye-bye passwords, hello to biometric authentication in a blink

Biometric solutions at Mobile World Congress move us closer to killing off passwords. Fujitsu announced a prototype smartphone that authenticates a person via iris recognition; the new ZTE Grand S3 uses eyeprint authentication scans...

ZTE's Grand S3 smartphone scans eyes for authentication

ZTE is taking biometric authentication in a new direction with its Grand S3 smartphone, which lets users log into their phones with eye scanning.

Revving up security illustration by Stephen Sauer [single use]

Your IT security infrastructure, rebooted for 2015

Cloud, mobile, social media and other factors are conspiring to force companies to reevaluate their security infrastructure, from firewalls to authentication.

Corporate IT: Beware the dating apps on your users' phones

Common vulnerabilities could be putting your company's data up for grabs

Load More